Mostrando 361 - 380 Resultados de 942 Para Buscar '"hacker"', tiempo de consulta: 0.06s Limitar resultados
  1. 361
    por Long, Johnny
    Publicado 2005
    “…Hackers y Seguridad…”
    Libro
  2. 362
    por Erickson, Jon, 1977-
    Publicado 2008
    “…Hackers y Seguridad…”
    Libro
  3. 363
    Publicado 2011
    “…Hackers y Seguridad…”
    Libro
  4. 364
    Publicado 2007
    Tabla de Contenidos: “…Tendencias y dificultades / Jordi Barba -- Hacia una ética dialógica en la empresa / Alberto Revenga -- Ética hacker y empresa: el reto de las TIC en los valores de empresa / Ramon Alcoberro…”
    Libro
  5. 365
    Publicado 2007
    Tabla de Contenidos: “…Tendencias y dificultades / Jordi Barba -- Hacia una ética dialógica en la empresa / Alberto Revenga -- Ética hacker y empresa: el reto de las TIC en los valores de empresa / Ramon Alcoberro…”
    991002482629706719
  6. 366
    por Ayala, Luis. author
    Publicado 2016
    Tabla de Contenidos: “…Chapter 1: Cyber-Physical Attack Recovery Procedures -- Chapter 2: Threats and Attack Detection -- Chapter 3: Prevent Hackers from Destroying a Boiler -- Chapter 4: Prevent Hackers from Destroying a Pressure Vessel -- Chapter 5: Prevent Hackers from Destroying Chillers -- Chapter 6: Prevent Hackers from Destroying a Gas Fuel Train -- Chapter 7: Prevent Hackers from Destroying a Cooling Tower -- Chapter 8: Preventing Hackers from Destroying a Backup Generator -- Chapter 9: Prevent Hackers from Destroying Switchgear -- Chapter 10: Eight Steps to Defend Building Control Systems -- Chapter 11: Block Hacker Surveillance of your Buildings -- Chapter 12: Cyber-Physical Attack Recovery Procedures Template…”
    Libro electrónico
  7. 367
    por Rivers, Pitt
    Publicado 1971
    Libro
  8. 368
    Publicado 2004
    Tabla de Contenidos: “…An attack on the telephone network -- An attack on an ISP -- If he had just paid the rent -- Inside a hacker sting operation ... -- Identity theft -- Let's ask the hackers ... -- Why do hackers hack? …”
    Libro electrónico
  9. 369
    Publicado 1929
    Libro
  10. 370
    por Wang, Wally
    Publicado 2006
    Tabla de Contenidos: “…Acknowledgments; Brief Contents; Contents in Detail; Introduction; PART 1: The Early Hackers; 1: The Hacker Mentality; Questioning Authority; Questioning Assumptions; Developing Values; The Three Stages of Hacking; 2: The First Hackers: The Phone Phreakers; A Short History of Phone Phreaking; Phone Phreaking Urban Legends; True and Verified Phone Phreaking Stories; Phone Phreaking Tools and Techniques; 3: Hacking People, Places, and Things; Social Engineering: The Art of Hacking People; Picking Locks; Exploring Urban Areas; Hacking the Airwaves; Hacking History (or, Hemp for Victory)…”
    Libro electrónico
  11. 371
    por Raymond, Eric S.
    Publicado 2001
    Tabla de Contenidos: “…Appendix A. How to Become a HackerWhy This Document?; What Is a Hacker?; The Hacker Attitude; Basic Hacking Skills; Status in the Hacker Culture; The Hacker/Nerd Connection; Points for Style; Other Resources; Frequently Asked Questions; Appendix B. …”
    Libro electrónico
  12. 372
    Publicado 1951
    Libro
  13. 373
    por Rivoira, G. T. 1849-1919
    Publicado 1975
    Libro
  14. 374
    por Benson, George Willard
    Publicado 1983
    Libro
  15. 375
    por Carr, Jeffrey
    Publicado 2010
    Tabla de Contenidos: “…Assessing the problem -- The rise of the non-state hacker -- The legal status of cyber warfare -- Responding to international cyber attacks as acts of war -- The intelligence component to cyber warfare -- Non-state hackers and the social web -- Follow the money -- Organized crime in cyberspace -- Investigating attribution -- Weaponizing malware -- The role of cyber in military doctrine -- A cyber early warning model -- Advice for policy makers from the field -- Afterword…”
    Libro electrónico
  16. 376
    por Beazley, J. D. 1885-1970
    Publicado 1976
    Libro
  17. 377
    por Ayala, Luis. author
    Publicado 2016
    Tabla de Contenidos: “…Chapter 1: Hacker Reconnaissance of a Hospital Network -- Chapter 2: How Hackers Gain Access to a Hospital Network -- Chapter 3: Active Medical Device Cyber-Attacks -- Chapter 4: Medical Facility Cyber-Physical Attacks -- Chapter 5: Hospital Insider Threat -- Chapter 6: Detection of Cyber-Attacks -- Chapter 7: Preventing Cyber-Attacks -- Chapter 8: Cyber-Attack Response and Recovery Planning -- Chapter 9: Appendix. …”
    Libro electrónico
  18. 378
  19. 379
    Publicado 2015
    “…Master the tactics and tools of the advanced persistent threat hacker In this book, IT security expert Tyler Wrightson reveals the mindset, skills, and effective attack vectors needed to compromise any target of choice. …”
    Libro electrónico
  20. 380
    por Sheetz, Michael
    Publicado 2007
    Tabla de Contenidos: “…A definition of computer forensics -- Introduction -- Forensic science -- The history of computer forensics -- The world wide web -- The hacker community -- Conclusion -- Basic of computer forensic concepts -- Introduction -- Understanding digital evidence -- Storage -- Processing -- What is computer data? …”
    Enlace del recurso
    Libro electrónico